diff --git a/2020/15xxx/CVE-2020-15859.json b/2020/15xxx/CVE-2020-15859.json index fdcfccf5515..c87e279c23c 100644 --- a/2020/15xxx/CVE-2020-15859.json +++ b/2020/15xxx/CVE-2020-15859.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] } diff --git a/2020/16xxx/CVE-2020-16092.json b/2020/16xxx/CVE-2020-16092.json index d751bdcfcc9..9b171c67ffb 100644 --- a/2020/16xxx/CVE-2020-16092.json +++ b/2020/16xxx/CVE-2020-16092.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1664", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] } diff --git a/2020/35xxx/CVE-2020-35504.json b/2020/35xxx/CVE-2020-35504.json index 9d672dafc1d..786cfa6c442 100644 --- a/2020/35xxx/CVE-2020-35504.json +++ b/2020/35xxx/CVE-2020-35504.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210713-0006/", "url": "https://security.netapp.com/advisory/ntap-20210713-0006/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2020/35xxx/CVE-2020-35505.json b/2020/35xxx/CVE-2020-35505.json index 2a77355c217..496124131a2 100644 --- a/2020/35xxx/CVE-2020-35505.json +++ b/2020/35xxx/CVE-2020-35505.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210713-0006/", "url": "https://security.netapp.com/advisory/ntap-20210713-0006/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2020/35xxx/CVE-2020-35506.json b/2020/35xxx/CVE-2020-35506.json index 38d765afff6..9bf96fda998 100644 --- a/2020/35xxx/CVE-2020-35506.json +++ b/2020/35xxx/CVE-2020-35506.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210713-0006/", "url": "https://security.netapp.com/advisory/ntap-20210713-0006/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/20xxx/CVE-2021-20257.json b/2021/20xxx/CVE-2021-20257.json index bc3ec987e1b..186f82b066c 100644 --- a/2021/20xxx/CVE-2021-20257.json +++ b/2021/20xxx/CVE-2021-20257.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220425-0003/", "url": "https://security.netapp.com/advisory/ntap-20220425-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/20xxx/CVE-2021-20263.json b/2021/20xxx/CVE-2021-20263.json index 83eb7dec2f5..a30317d1d91 100644 --- a/2021/20xxx/CVE-2021-20263.json +++ b/2021/20xxx/CVE-2021-20263.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210507-0002/", "url": "https://security.netapp.com/advisory/ntap-20210507-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3409.json b/2021/3xxx/CVE-2021-3409.json index 3415e64c2b9..15bf7448f87 100644 --- a/2021/3xxx/CVE-2021-3409.json +++ b/2021/3xxx/CVE-2021-3409.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210507-0001/", "url": "https://security.netapp.com/advisory/ntap-20210507-0001/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3416.json b/2021/3xxx/CVE-2021-3416.json index f5e9d95f35f..9f551759218 100644 --- a/2021/3xxx/CVE-2021-3416.json +++ b/2021/3xxx/CVE-2021-3416.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210507-0002/", "url": "https://security.netapp.com/advisory/ntap-20210507-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3527.json b/2021/3xxx/CVE-2021-3527.json index 26f4c93f0ef..4571b1bf5d5 100644 --- a/2021/3xxx/CVE-2021-3527.json +++ b/2021/3xxx/CVE-2021-3527.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3544.json b/2021/3xxx/CVE-2021-3544.json index 10c0f165ad8..09342f4cde9 100644 --- a/2021/3xxx/CVE-2021-3544.json +++ b/2021/3xxx/CVE-2021-3544.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-4980", "url": "https://www.debian.org/security/2021/dsa-4980" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3545.json b/2021/3xxx/CVE-2021-3545.json index 8ec08a6e0c1..d50099597b4 100644 --- a/2021/3xxx/CVE-2021-3545.json +++ b/2021/3xxx/CVE-2021-3545.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-4980", "url": "https://www.debian.org/security/2021/dsa-4980" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3607.json b/2021/3xxx/CVE-2021-3607.json index b6a37436796..74aea9dda3c 100644 --- a/2021/3xxx/CVE-2021-3607.json +++ b/2021/3xxx/CVE-2021-3607.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220318-0002/", "url": "https://security.netapp.com/advisory/ntap-20220318-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3608.json b/2021/3xxx/CVE-2021-3608.json index d7fe7f52b2c..6d071e0e043 100644 --- a/2021/3xxx/CVE-2021-3608.json +++ b/2021/3xxx/CVE-2021-3608.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220318-0002/", "url": "https://security.netapp.com/advisory/ntap-20220318-0002/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3611.json b/2021/3xxx/CVE-2021-3611.json index e520e932764..5067eaab1a5 100644 --- a/2021/3xxx/CVE-2021-3611.json +++ b/2021/3xxx/CVE-2021-3611.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0001/", "url": "https://security.netapp.com/advisory/ntap-20220624-0001/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3682.json b/2021/3xxx/CVE-2021-3682.json index d0936d68ae8..2a8e21cad86 100644 --- a/2021/3xxx/CVE-2021-3682.json +++ b/2021/3xxx/CVE-2021-3682.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-4980", "url": "https://www.debian.org/security/2021/dsa-4980" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3713.json b/2021/3xxx/CVE-2021-3713.json index 1058aec28eb..bee3d1071e1 100644 --- a/2021/3xxx/CVE-2021-3713.json +++ b/2021/3xxx/CVE-2021-3713.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-4980", "url": "https://www.debian.org/security/2021/dsa-4980" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3748.json b/2021/3xxx/CVE-2021-3748.json index 5dd1c091b3b..c8af3337245 100644 --- a/2021/3xxx/CVE-2021-3748.json +++ b/2021/3xxx/CVE-2021-3748.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220425-0004/", "url": "https://security.netapp.com/advisory/ntap-20220425-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3750.json b/2021/3xxx/CVE-2021-3750.json index 845c22a98c2..edb179d4207 100644 --- a/2021/3xxx/CVE-2021-3750.json +++ b/2021/3xxx/CVE-2021-3750.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0003/", "url": "https://security.netapp.com/advisory/ntap-20220624-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3930.json b/2021/3xxx/CVE-2021-3930.json index 1deec636079..5c25f98f92e 100644 --- a/2021/3xxx/CVE-2021-3930.json +++ b/2021/3xxx/CVE-2021-3930.json @@ -58,6 +58,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/3xxx/CVE-2021-3947.json b/2021/3xxx/CVE-2021-3947.json index 5c61511d31d..f97c3d3b391 100644 --- a/2021/3xxx/CVE-2021-3947.json +++ b/2021/3xxx/CVE-2021-3947.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220318-0003/", "url": "https://security.netapp.com/advisory/ntap-20220318-0003/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/4xxx/CVE-2021-4145.json b/2021/4xxx/CVE-2021-4145.json index e87aef65928..ac74d9db70f 100644 --- a/2021/4xxx/CVE-2021-4145.json +++ b/2021/4xxx/CVE-2021-4145.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220311-0004/", "url": "https://security.netapp.com/advisory/ntap-20220311-0004/" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/4xxx/CVE-2021-4206.json b/2021/4xxx/CVE-2021-4206.json index 9661c2b292e..23dfa270f8e 100644 --- a/2021/4xxx/CVE-2021-4206.json +++ b/2021/4xxx/CVE-2021-4206.json @@ -58,6 +58,11 @@ "refsource": "DEBIAN", "name": "DSA-5133", "url": "https://www.debian.org/security/2022/dsa-5133" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2021/4xxx/CVE-2021-4207.json b/2021/4xxx/CVE-2021-4207.json index 3ec79e7b55d..0a4e41d1538 100644 --- a/2021/4xxx/CVE-2021-4207.json +++ b/2021/4xxx/CVE-2021-4207.json @@ -58,6 +58,11 @@ "refsource": "DEBIAN", "name": "DSA-5133", "url": "https://www.debian.org/security/2022/dsa-5133" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2022/26xxx/CVE-2022-26353.json b/2022/26xxx/CVE-2022-26353.json index ccc8add73d8..3a96017ba3a 100644 --- a/2022/26xxx/CVE-2022-26353.json +++ b/2022/26xxx/CVE-2022-26353.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-5133", "url": "https://www.debian.org/security/2022/dsa-5133" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] }, diff --git a/2022/26xxx/CVE-2022-26354.json b/2022/26xxx/CVE-2022-26354.json index 23e7a477f61..1d2ae0e386f 100644 --- a/2022/26xxx/CVE-2022-26354.json +++ b/2022/26xxx/CVE-2022-26354.json @@ -63,6 +63,11 @@ "refsource": "DEBIAN", "name": "DSA-5133", "url": "https://www.debian.org/security/2022/dsa-5133" + }, + { + "refsource": "GENTOO", + "name": "GLSA-202208-27", + "url": "https://security.gentoo.org/glsa/202208-27" } ] },